Tag: study

  • Slashdot: Women Dating Safety App ‘Tea’ Breached, Users’ IDs Posted To 4chan

    Source URL: https://yro.slashdot.org/story/25/07/25/1934249/women-dating-safety-app-tea-breached-users-ids-posted-to-4chan?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Women Dating Safety App ‘Tea’ Breached, Users’ IDs Posted To 4chan Feedly Summary: AI Summary and Description: Yes **Summary:** The text describes a significant data breach involving the Tea app, which has exposed sensitive user data, including selfies and driver’s licenses, leading to privacy concerns and regulatory implications. This…

  • Schneier on Security: Subliminal Learning in AIs

    Source URL: https://www.schneier.com/blog/archives/2025/07/subliminal-learning-in-ais.html Source: Schneier on Security Title: Subliminal Learning in AIs Feedly Summary: Today’s freaky LLM behavior: We study subliminal learning, a surprising phenomenon where language models learn traits from model-generated data that is semantically unrelated to those traits. For example, a “student” model learns to prefer owls when trained on sequences of numbers…

  • Scott Logic: Visualising the Trade Lifecycle – Phase 2: Refactoring with Cursor IDE

    Source URL: https://blog.scottlogic.com/2025/07/22/visualising-the-trade-lifecycle-phase-2-refactoring-with-cursor-ide.html Source: Scott Logic Title: Visualising the Trade Lifecycle – Phase 2: Refactoring with Cursor IDE Feedly Summary: In this instalment, I discovered that Cursor IDE transformed my chaotic multi-AI orchestra of wayward soloists into something rather more like a proper piano duet, successfully refactoring my 847-line monolith into modular components without the…

  • Slashdot: Humans Can Be Tracked With Unique ‘Fingerprint’ Based On How Their Bodies Block Wi-Fi Signals

    Source URL: https://mobile.slashdot.org/story/25/07/22/2112203/humans-can-be-tracked-with-unique-fingerprint-based-on-how-their-bodies-block-wi-fi-signals?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: Humans Can Be Tracked With Unique ‘Fingerprint’ Based On How Their Bodies Block Wi-Fi Signals Feedly Summary: AI Summary and Description: Yes Summary: Researchers from La Sapienza University in Rome have developed “WhoFi,” a novel system that leverages the distortion of Wi-Fi signals caused by human bodies to identify…

  • Simon Willison’s Weblog: Subliminal Learning: Language Models Transmit Behavioral Traits via Hidden Signals in Data

    Source URL: https://simonwillison.net/2025/Jul/22/subliminal-learning/ Source: Simon Willison’s Weblog Title: Subliminal Learning: Language Models Transmit Behavioral Traits via Hidden Signals in Data Feedly Summary: Subliminal Learning: Language Models Transmit Behavioral Traits via Hidden Signals in Data This new alignment paper from Anthropic wins my prize for best illustrative figure so far this year: The researchers found that…

  • Simon Willison’s Weblog: Our contribution to a global environmental standard for AI

    Source URL: https://simonwillison.net/2025/Jul/22/mistral-environmental-standard/ Source: Simon Willison’s Weblog Title: Our contribution to a global environmental standard for AI Feedly Summary: Our contribution to a global environmental standard for AI Mistral have released environmental impact numbers for their largest model, Mistral Large 2, in more detail than I have seen from any of the other large AI…

  • Scott Logic: Visualising the Trade Lifecycle – Phase 1 – Building a React SPA with Multiple AIs

    Source URL: https://blog.scottlogic.com/2025/07/17/visualising-the-trade-lifecycle-phase-1-building-a-react-spa-with-multiple-ais.html Source: Scott Logic Title: Visualising the Trade Lifecycle – Phase 1 – Building a React SPA with Multiple AIs Feedly Summary: A non-React developer built a trade lifecycle simulation using three AI assistants as his coding team, discovering that managing AI agents is rather like conducting an orchestra where each musician excels…

  • CSA: Copilot Studio: AIjacking Leads to Data Exfiltration

    Source URL: https://cloudsecurityalliance.org/articles/a-copilot-studio-story-2-when-aijacking-leads-to-full-data-exfiltration Source: CSA Title: Copilot Studio: AIjacking Leads to Data Exfiltration Feedly Summary: AI Summary and Description: Yes Summary: The text discusses significant vulnerabilities in AI agents, particularly focusing on prompt injection attacks that led to unauthorized access and exfiltration of sensitive data. It provides a case study involving a customer service agent…

  • Cloud Blog: Engineering Deutsche Telekom’s sovereign data platform

    Source URL: https://cloud.google.com/blog/topics/customers/engineering-deutsche-telekoms-sovereign-data-platform/ Source: Cloud Blog Title: Engineering Deutsche Telekom’s sovereign data platform Feedly Summary: Imagine transforming a sprawling, 20-year-old telecommunications data ecosystem, laden with sensitive customer information and bound by stringent European regulations, into a nimble, cloud-native powerhouse. That’s precisely the challenge Deutsche Telekom tackled head-on, explains Ashutosh Mishra. By using Google Cloud’s Sovereign…